× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: a15333778d612df71e987dd385b9c5e32ef25bcc7dd4331672fb17e300c3acd0
File name: robin.exe
Detection ratio: 46 / 67
Analysis date: 2018-11-15 11:31:44 UTC ( 6 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware Generic.Delph.PWS.E06EBA9A 20181115
AegisLab Trojan.Win32.Delf.moev 20181115
AhnLab-V3 Malware/Win32.Generic.C2622462 20181115
ALYac Generic.Delph.PWS.E06EBA9A 20181115
Antiy-AVL Trojan[Ransom]/Win32.Blocker 20181115
Arcabit Generic.Delph.PWS.E06EBA9A 20181115
Avast Win32:Malware-gen 20181115
AVG Win32:Malware-gen 20181115
Avira (no cloud) TR/Crypt.XPACK.Gen 20181115
BitDefender Generic.Delph.PWS.E06EBA9A 20181115
CAT-QuickHeal Trojan.Sigmal.S3989901 20181115
ClamAV Win.Ransomware.Delf-6651871-0 20181115
CrowdStrike Falcon (ML) malicious_confidence_100% (D) 20181022
Cylance Unsafe 20181115
DrWeb Trojan.PWS.Stealer.24300 20181115
Emsisoft Generic.Delph.PWS.E06EBA9A (B) 20181115
Endgame malicious (high confidence) 20181108
ESET-NOD32 a variant of Win32/PSW.Delf.OSF 20181115
F-Secure Generic.Delph.PWS.E06EBA9A 20181115
Fortinet W32/Delf.OSF!tr 20181115
GData Generic.Delph.PWS.E06EBA9A 20181115
Ikarus Trojan-PSW.Delf 20181115
Sophos ML heuristic 20181108
Jiangmin Trojan.PSW.Coins.buh 20181115
K7AntiVirus Password-Stealer ( 0052f96e1 ) 20181113
K7GW Password-Stealer ( 0052f96e1 ) 20181115
Kaspersky Trojan-Ransom.Win32.Blocker.lckf 20181115
Malwarebytes Trojan.AzorUlt 20181115
MAX malware (ai score=87) 20181115
McAfee GenericRXGI-KI!E024B3244701 20181115
McAfee-GW-Edition BehavesLike.Win32.StartPage.ch 20181115
Microsoft PWS:Win32/Stimilina.E!bit 20181115
eScan Generic.Delph.PWS.E06EBA9A 20181115
NANO-Antivirus Trojan.Win32.Stealer.fflqpr 20181115
Panda Trj/Genetic.gen 20181114
Qihoo-360 HEUR/QVM05.1.3898.Malware.Gen 20181115
Sophos AV Troj/PWS-CJJ 20181115
SUPERAntiSpyware Trojan.Agent/Gen-Crypt 20181114
Symantec Trojan.Coinstealer 20181115
TrendMicro TrojanSpy.Win32.CLIPBANKER.SMMR 20181115
TrendMicro-HouseCall TrojanSpy.Win32.CLIPBANKER.SMMR 20181115
VBA32 BScope.TrojanRansom.Blocker 20181115
Webroot W32.Trojan.Gen 20181115
Yandex Trojan.Blocker!m3aQMhOteaA 20181115
Zillya Trojan.Blocker.Win32.40079 20181114
ZoneAlarm by Check Point Trojan-Ransom.Win32.Blocker.lckf 20181115
Alibaba 20180921
Avast-Mobile 20181115
Babable 20180918
Baidu 20181115
Bkav 20181115
CMC 20181115
Cybereason 20180225
Cyren 20181115
eGambit 20181115
F-Prot 20181115
Kingsoft 20181115
Palo Alto Networks (Known Signatures) 20181115
Rising 20181115
SentinelOne (Static ML) 20181011
Symantec Mobile Insight 20181108
TACHYON 20181115
Tencent 20181115
TheHacker 20181113
Trustlook 20181115
VIPRE 20181115
ViRobot 20181115
Zoner 20181115
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
FileVersionInfo properties
Packers identified
PEiD BobSoft Mini Delphi -> BoB / BobSoft
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 1992-06-19 22:22:17
Entry Point 0x0001A1F8
Number of sections 5
PE sections
PE imports
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegCloseKey
FreeSid
DeleteDC
SelectObject
BitBlt
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetStdHandle
EnterCriticalSection
GetSystemInfo
FreeLibrary
QueryPerformanceCounter
ExitProcess
GetThreadLocale
GlobalUnlock
GetModuleFileNameA
RtlUnwind
LoadLibraryA
CopyFileW
DeleteCriticalSection
GetStartupInfoA
GetLocaleInfoA
LocalAlloc
FindClose
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateDirectoryW
GetCommandLineA
GlobalLock
RaiseException
WideCharToMultiByte
GetModuleHandleA
FindNextFileW
WriteFile
GetCurrentProcess
DeleteFileW
FindFirstFileW
GetCurrentThreadId
LocalFree
InitializeCriticalSection
VirtualFree
GetFileAttributesW
Sleep
GetTickCount
GetVersion
GetProcAddress
VirtualAlloc
GetCurrentProcessId
LeaveCriticalSection
CoCreateInstance
OleInitialize
SysReAllocStringLen
SysFreeString
SysAllocStringLen
ReleaseDC
GetSystemMetrics
CharToOemBuffA
CharNextA
MessageBoxA
GetKeyboardType
GetDC
ExifTool file metadata
MIMEType
application/octet-stream

Subsystem
Windows GUI

SubsystemVersion
4.0

MachineType
Intel 386 or later, and compatibles

TimeStamp
1992:06:19 23:22:17+01:00

FileType
Win32 EXE

PEType
PE32

CodeSize
103424

LinkerVersion
2.25

FileTypeExtension
exe

InitializedDataSize
10752

ImageFileCharacteristics
Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi

EntryPoint
0x1a1f8

OSVersion
4.0

ImageVersion
0.0

UninitializedDataSize
0

File identification
MD5 e024b3244701960765eadda50ea91b8a
SHA1 199fcc923343c3ea391a361e1355dceab338ae47
SHA256 a15333778d612df71e987dd385b9c5e32ef25bcc7dd4331672fb17e300c3acd0
ssdeep
3072:tuOSXpMx7ZAlHsbfUkolNGti7lfqeSxM3SpyEY3E/Ixg/:Zzx7ZApszolIo7lf/ipT/I

authentihash d1db0b0c57d64b47ebfefb76970794046ff34aa5cce95b86f75069ba95fef111
imphash 6d1f2b41411eacafcf447fc002d8cb00
File size 112.5 KB ( 115200 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID Windows screen saver (40.5%)
Win32 Dynamic Link Library (generic) (20.3%)
Win32 Executable (generic) (13.9%)
Win16/32 Executable Delphi generic (6.4%)
OS/2 Executable (generic) (6.2%)
Tags
bobsoft peexe

VirusTotal metadata
First submission 2018-11-15 11:31:44 UTC ( 6 months, 1 week ago )
Last submission 2018-11-23 02:22:43 UTC ( 6 months ago )
File names robin.exe
e024b3244701960765eadda50ea91b8a
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Deleted files
Created mutexes
Opened mutexes
Opened service managers
Opened services
Runtime DLLs
HTTP requests
TCP connections